Home / Blogs

Papers Now Available Publicly for W3C/IAB "Strengthening the Internet" Workshop

Dan York

Want to read a wide range of views on how to strengthen the security and privacy of the Internet? Interested to hear how some of the leaders of the open standards world think we can make the Internet more secure? As I wrote about previously here on CircleID, the W3C and the Internet Architecture Board (IAB) are jointly sponsoring a workshop on "Strengthening The Internet" (STRINT) on February 28 and March 1 in London just prior to the IETF 89 meeting happening all next week. The workshop is invitation-only and to be invited you had to submit a "paper" or Internet-Draft outlining what you thought are the issues and how you thought you could contribute to the conversation.

There were 66 papers accepted and they are now available for public viewing at:


These represent the points of view of individuals as well as small groups of people who jointly submitted a paper. Some of the documents are quite short while others go on at quite some length. The papers include some of the leading contributors to the IETF, independent security experts, representatives of other organizations, representatives of vendors, academic researchers and many, many interested individuals. They cover a wide range of topics from security and privacy to encryption, VoIP and much more.

If you're really interested in understanding the current state of security on the Internet, these documents make for great reading.

As for the STRINT workshop itself, the agenda has now been posted and the workshop goals have been stated:

The STRINT workshop starts from the position that Pervasive Monitoring (PM) is an attack. While some dissenting voices are expected and need to be heard, that is the baseline assumption for the workshop, and our high-level goal is to provide some more consideration of that and how it ought affect future work within the IETF and W3C.

At the next level down the goals of the STRINT workshop are to:

  • Discuss and hopefully come to agreement among the participants on concepts in PM for both threats and mitigation, e.g., "opportunistic" as the term applies to cryptography.
  • Discuss the PM threat model, and how that might be usefully documented for the IETF at least, e.g., via an update to BCP72.
  • Discuss and progress common understanding in the trade-offs between mitigating and suffering PM.
  • Identify weak links in the chain of Web security architecture with respect to PM.
  • Identify potential work items for the IETF, IAB, IRTF and W3C that help mitigate PM.
  • Discuss the kinds of action outside the IETF/W3C context might help those done within the IETF/W3C.

As is note on that agenda page there will be an IRC chat room available and they are working on some form of streaming for remote attendees. If you're interested in listening in remotely, you may want to monitor the perpass mailing list (or subscribe to the list).

It should be an interesting workshop and the resulting discussions will undoubtedly influence activity at next week's IETF 89 meeting in London.

P.S. In the interest of full disclosure, I should note that while I am attending IETF 89 in London next week I am not attending the STRINT workshop. Colleagues of mine from the Internet Society are attending, though, and my colleague Andrei Robachevsky described their position paper, with which I agree, in a recent blog post: "The Danger Of The New Internet Choke Points"

By Dan York, Author and Speaker on Internet technologies - and on staff of Internet Society. Dan is employed as a Senior Content Strategist with the Internet Society but opinions posted on CircleID are entirely his own. Visit the blog maintained by Dan York here.

Related topics: Cybersecurity, Internet Protocol, Privacy


Don't miss a thing – get the Weekly Wrap delivered to your inbox.


To post comments, please login or create an account.

Related Blogs

Related News

Explore Topics

Dig Deeper


DNS Security

Sponsored by Afilias


Sponsored by Verisign
Afilias Mobile & Web Services

Mobile Internet

Sponsored by Afilias Mobile & Web Services

Promoted Posts

Now Is the Time for .eco

.eco launches globally at 16:00 UTC on April 25, 2017, when domains will be available on a first-come, first-serve basis. .eco is for businesses, non-profits and people committed to positive change for the planet. See list of registrars offering .eco more»

Industry Updates – Sponsored Posts

Verisign Named to the Online Trust Alliance's 2017 Audit and Honor Roll

Attacks Decrease by 23 Precent in 1st Quarter While Peak Attack Sizes Increase: DDoS Trends Report

Leading Internet Associations Strengthen Cooperation

Verisign Releases Q4 2016 DDoS Trends Report: 167% Increase in Average Peak Attack from 2015 to 2016

Verisign Q3 2016 DDoS Trends Report: User Datagram Protocol (UDP) Flood Attacks Continue to Dominate

2016 U.S. Election: An Internet Forecast

Government Guidance for Email Authentication Has Arrived in USA and UK

ValiMail Raises $12M for Its Email Authentication Service

Don't Gamble With Your DNS

Defending Against Layer 7 DDoS Attacks

Understanding the Risks of the Dark Web

New TLD? Make Sure It's Secure

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

How Savvy DDoS Attackers Are Using DNSSEC Against Us

Facilitating a Trusted Web Space for Financial Service Professionals

MarkMonitor Partners with CYREN to Deepen Visibility into Global Phishing Attacks

Verisign Named to the Online Trust Alliance's 2016 Honor Roll

Dyn Partners with the Internet Systems Consortium to Host Global F-Root Nameservers

Verisign Q1 2016 DDoS Trends: Attack Activity Increases 111 Percent Year Over Year

Is Your TLD Threat Mitigation Strategy up to Scratch?